diff --git a/2022/27xxx/CVE-2022-27895.json b/2022/27xxx/CVE-2022-27895.json index 968cf47f18c..734bff62311 100644 --- a/2022/27xxx/CVE-2022-27895.json +++ b/2022/27xxx/CVE-2022-27895.json @@ -37,7 +37,7 @@ "description_data": [ { "lang": "eng", - "value": "Information Exposure Through Log Files vulnerability discovered in Foundry when logs were captured using an underlying library known as Build2. This issue was present in versions earlier than 1.785.0. Upgrade to Build2 version 1.785.0 or greater.\n" + "value": "Information Exposure Through Log Files vulnerability discovered in Foundry when logs were captured using an underlying library known as Build2. This issue was present in versions earlier than 1.785.0. Upgrade to Build2 version 1.785.0 or greater." } ] }, @@ -75,8 +75,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-06.md" + "refsource": "MISC", + "url": "https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-06.md", + "name": "https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-06.md" } ] }, @@ -86,4 +87,4 @@ ], "discovery": "INTERNAL" } -} +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38666.json b/2022/38xxx/CVE-2022-38666.json index db635eebc58..fee2a23a0ec 100644 --- a/2022/38xxx/CVE-2022-38666.json +++ b/2022/38xxx/CVE-2022-38666.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-38666", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/41xxx/CVE-2022-41558.json b/2022/41xxx/CVE-2022-41558.json index 10860ce1469..7247b50d5fc 100644 --- a/2022/41xxx/CVE-2022-41558.json +++ b/2022/41xxx/CVE-2022-41558.json @@ -1,265 +1,270 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@tibco.com", - "DATE_PUBLIC": "2022-11-15T17:00:00Z", - "ID": "CVE-2022-41558", - "STATE": "PUBLIC", - "TITLE": "TIBCO Spotfire Stored Cross Site Scripting (XSS) Vulnerability" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "TIBCO Spotfire Analyst", - "version": { - "version_data": [ - { - "version_affected": "<=", - "version_value": "11.4.4" - } - ] - } - }, - { - "product_name": "TIBCO Spotfire Analyst", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "11.5.0" - }, - { - "version_affected": "=", - "version_value": "11.6.0" - }, - { - "version_affected": "=", - "version_value": "11.7.0" - }, - { - "version_affected": "=", - "version_value": "11.8.0" - }, - { - "version_affected": "=", - "version_value": "12.0.0" - }, - { - "version_affected": "=", - "version_value": "12.0.1" - } - ] - } - }, - { - "product_name": "TIBCO Spotfire Analyst", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "12.1.0" - } - ] - } - }, - { - "product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace", - "version": { - "version_data": [ - { - "version_affected": "<=", - "version_value": "12.1.0" - } - ] - } - }, - { - "product_name": "TIBCO Spotfire Desktop", - "version": { - "version_data": [ - { - "version_affected": "<=", - "version_value": "11.4.4" - } - ] - } - }, - { - "product_name": "TIBCO Spotfire Desktop", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "11.5.0" - }, - { - "version_affected": "=", - "version_value": "11.6.0" - }, - { - "version_affected": "=", - "version_value": "11.7.0" - }, - { - "version_affected": "=", - "version_value": "11.8.0" - }, - { - "version_affected": "=", - "version_value": "12.0.0" - }, - { - "version_affected": "=", - "version_value": "12.0.1" - } - ] - } - }, - { - "product_name": "TIBCO Spotfire Desktop", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "12.1.0" - } - ] - } - }, - { - "product_name": "TIBCO Spotfire Server", - "version": { - "version_data": [ - { - "version_affected": "<=", - "version_value": "11.4.8" - } - ] - } - }, - { - "product_name": "TIBCO Spotfire Server", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "11.5.0" - }, - { - "version_affected": "=", - "version_value": "11.6.0" - }, - { - "version_affected": "=", - "version_value": "11.6.1" - }, - { - "version_affected": "=", - "version_value": "11.6.2" - }, - { - "version_affected": "=", - "version_value": "11.6.3" - }, - { - "version_affected": "=", - "version_value": "11.7.0" - }, - { - "version_affected": "=", - "version_value": "11.8.0" - }, - { - "version_affected": "=", - "version_value": "11.8.1" - }, - { - "version_affected": "=", - "version_value": "12.0.0" - }, - { - "version_affected": "=", - "version_value": "12.0.1" - } - ] - } - }, - { - "product_name": "TIBCO Spotfire Server", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "12.1.0" - } - ] - } - } - ] - }, - "vendor_name": "TIBCO Software Inc." - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The Visualizations component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 11.4.4 and below, TIBCO Spotfire Analyst: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Analyst: version 12.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 12.1.0 and below, TIBCO Spotfire Desktop: versions 11.4.4 and below, TIBCO Spotfire Desktop: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Desktop: version 12.1.0, TIBCO Spotfire Server: versions 11.4.8 and below, TIBCO Spotfire Server: versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, and 12.0.1, and TIBCO Spotfire Server: version 12.1.0." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 9, - "baseSeverity": "CRITICAL", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "LOW", - "scope": "CHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", - "version": "3.1" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Successful execution of these vulnerabilities will result in an attacker being able to execute commands with the privileges of the affected user." - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://www.tibco.com/services/support/advisories", - "refsource": "CONFIRM", - "url": "https://www.tibco.com/services/support/advisories" - } - ] - }, - "solution": [ - { - "lang": "eng", - "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 11.4.4 and below: update to version 11.4.5 or later\nTIBCO Spotfire Analyst versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1: update to version 12.0.2 or later\nTIBCO Spotfire Analyst version 12.1.0: update to version 12.1.1 or later\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 12.1.0 and below: update to version 12.1.1 or later\nTIBCO Spotfire Desktop versions 11.4.4 and below: update to version 11.4.5 or later\nTIBCO Spotfire Desktop versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1: update to version 12.0.2 or later\nTIBCO Spotfire Desktop version 12.1.0: update to version 12.1.1 or later\nTIBCO Spotfire Server versions 11.4.8 and below: update to version 11.4.9 or later\nTIBCO Spotfire Server versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, and 12.0.1: update to version 12.0.2 or later\nTIBCO Spotfire Server version 12.1.0: update to version 12.1.1 or later" - } - ], - "source": { - "discovery": "Discovery statement" - } -} + "CVE_data_meta": { + "ASSIGNER": "security@tibco.com", + "DATE_PUBLIC": "2022-11-15T17:00:00Z", + "ID": "CVE-2022-41558", + "STATE": "PUBLIC", + "TITLE": "TIBCO Spotfire Stored Cross Site Scripting (XSS) Vulnerability" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "TIBCO Spotfire Analyst", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "11.4.4" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Analyst", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "11.5.0" + }, + { + "version_affected": "=", + "version_value": "11.6.0" + }, + { + "version_affected": "=", + "version_value": "11.7.0" + }, + { + "version_affected": "=", + "version_value": "11.8.0" + }, + { + "version_affected": "=", + "version_value": "12.0.0" + }, + { + "version_affected": "=", + "version_value": "12.0.1" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Analyst", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "12.1.0" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "12.1.0" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Desktop", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "11.4.4" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Desktop", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "11.5.0" + }, + { + "version_affected": "=", + "version_value": "11.6.0" + }, + { + "version_affected": "=", + "version_value": "11.7.0" + }, + { + "version_affected": "=", + "version_value": "11.8.0" + }, + { + "version_affected": "=", + "version_value": "12.0.0" + }, + { + "version_affected": "=", + "version_value": "12.0.1" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Desktop", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "12.1.0" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Server", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "11.4.8" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "11.5.0" + }, + { + "version_affected": "=", + "version_value": "11.6.0" + }, + { + "version_affected": "=", + "version_value": "11.6.1" + }, + { + "version_affected": "=", + "version_value": "11.6.2" + }, + { + "version_affected": "=", + "version_value": "11.6.3" + }, + { + "version_affected": "=", + "version_value": "11.7.0" + }, + { + "version_affected": "=", + "version_value": "11.8.0" + }, + { + "version_affected": "=", + "version_value": "11.8.1" + }, + { + "version_affected": "=", + "version_value": "12.0.0" + }, + { + "version_affected": "=", + "version_value": "12.0.1" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "12.1.0" + } + ] + } + } + ] + }, + "vendor_name": "TIBCO Software Inc." + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Visualizations component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 11.4.4 and below, TIBCO Spotfire Analyst: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Analyst: version 12.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 12.1.0 and below, TIBCO Spotfire Desktop: versions 11.4.4 and below, TIBCO Spotfire Desktop: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Desktop: version 12.1.0, TIBCO Spotfire Server: versions 11.4.8 and below, TIBCO Spotfire Server: versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, and 12.0.1, and TIBCO Spotfire Server: version 12.1.0." + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Successful execution of these vulnerabilities will result in an attacker being able to execute commands with the privileges of the affected user." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.tibco.com/services/support/advisories", + "refsource": "CONFIRM", + "url": "https://www.tibco.com/services/support/advisories" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tibco.com/support/advisories/2022/11/tibco-security-advisory-november-15-2022-tibco-spotfire-cve-2022-41558", + "url": "https://www.tibco.com/support/advisories/2022/11/tibco-security-advisory-november-15-2022-tibco-spotfire-cve-2022-41558" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 11.4.4 and below: update to version 11.4.5 or later\nTIBCO Spotfire Analyst versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1: update to version 12.0.2 or later\nTIBCO Spotfire Analyst version 12.1.0: update to version 12.1.1 or later\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 12.1.0 and below: update to version 12.1.1 or later\nTIBCO Spotfire Desktop versions 11.4.4 and below: update to version 11.4.5 or later\nTIBCO Spotfire Desktop versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1: update to version 12.0.2 or later\nTIBCO Spotfire Desktop version 12.1.0: update to version 12.1.1 or later\nTIBCO Spotfire Server versions 11.4.8 and below: update to version 11.4.9 or later\nTIBCO Spotfire Server versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, and 12.0.1: update to version 12.0.2 or later\nTIBCO Spotfire Server version 12.1.0: update to version 12.1.1 or later" + } + ], + "source": { + "discovery": "Discovery statement" + } +} \ No newline at end of file diff --git a/2022/45xxx/CVE-2022-45379.json b/2022/45xxx/CVE-2022-45379.json index c36a5458efd..8fb4bcb5b95 100644 --- a/2022/45xxx/CVE-2022-45379.json +++ b/2022/45xxx/CVE-2022-45379.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45379", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45380.json b/2022/45xxx/CVE-2022-45380.json index 4fa39c0966b..766f13310fb 100644 --- a/2022/45xxx/CVE-2022-45380.json +++ b/2022/45xxx/CVE-2022-45380.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45380", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45381.json b/2022/45xxx/CVE-2022-45381.json index 872b4f5dce2..30bfe3e9cd9 100644 --- a/2022/45xxx/CVE-2022-45381.json +++ b/2022/45xxx/CVE-2022-45381.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45381", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45382.json b/2022/45xxx/CVE-2022-45382.json index f37edd9d97f..c8a2e36a262 100644 --- a/2022/45xxx/CVE-2022-45382.json +++ b/2022/45xxx/CVE-2022-45382.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45382", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45383.json b/2022/45xxx/CVE-2022-45383.json index 4028d04b9c7..a57d130134c 100644 --- a/2022/45xxx/CVE-2022-45383.json +++ b/2022/45xxx/CVE-2022-45383.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45383", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45384.json b/2022/45xxx/CVE-2022-45384.json index e08495dd4c6..1c87267f2fe 100644 --- a/2022/45xxx/CVE-2022-45384.json +++ b/2022/45xxx/CVE-2022-45384.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45384", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45385.json b/2022/45xxx/CVE-2022-45385.json index 6b15d089d80..bc1d67037e3 100644 --- a/2022/45xxx/CVE-2022-45385.json +++ b/2022/45xxx/CVE-2022-45385.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45385", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45386.json b/2022/45xxx/CVE-2022-45386.json index 9f999df1972..467ea589e94 100644 --- a/2022/45xxx/CVE-2022-45386.json +++ b/2022/45xxx/CVE-2022-45386.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45386", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45387.json b/2022/45xxx/CVE-2022-45387.json index 85cc6587ea6..733f9f674c7 100644 --- a/2022/45xxx/CVE-2022-45387.json +++ b/2022/45xxx/CVE-2022-45387.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45387", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45388.json b/2022/45xxx/CVE-2022-45388.json index 4becd9653f6..9095d40a5b0 100644 --- a/2022/45xxx/CVE-2022-45388.json +++ b/2022/45xxx/CVE-2022-45388.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45388", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45389.json b/2022/45xxx/CVE-2022-45389.json index 3ebdd1798b6..866e8552706 100644 --- a/2022/45xxx/CVE-2022-45389.json +++ b/2022/45xxx/CVE-2022-45389.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45389", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45390.json b/2022/45xxx/CVE-2022-45390.json index 0585622e0bf..957418a5b61 100644 --- a/2022/45xxx/CVE-2022-45390.json +++ b/2022/45xxx/CVE-2022-45390.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45390", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45391.json b/2022/45xxx/CVE-2022-45391.json index a0badcea9f0..39c8bb43cb3 100644 --- a/2022/45xxx/CVE-2022-45391.json +++ b/2022/45xxx/CVE-2022-45391.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45391", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45392.json b/2022/45xxx/CVE-2022-45392.json index 36c49cacdd5..76071033340 100644 --- a/2022/45xxx/CVE-2022-45392.json +++ b/2022/45xxx/CVE-2022-45392.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45392", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45393.json b/2022/45xxx/CVE-2022-45393.json index d067e6746b4..35ed15f58c3 100644 --- a/2022/45xxx/CVE-2022-45393.json +++ b/2022/45xxx/CVE-2022-45393.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45393", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45394.json b/2022/45xxx/CVE-2022-45394.json index 25dd88c6366..a5980cebd51 100644 --- a/2022/45xxx/CVE-2022-45394.json +++ b/2022/45xxx/CVE-2022-45394.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45394", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45395.json b/2022/45xxx/CVE-2022-45395.json index d6a9c75f19d..7f4b495eb09 100644 --- a/2022/45xxx/CVE-2022-45395.json +++ b/2022/45xxx/CVE-2022-45395.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45395", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45396.json b/2022/45xxx/CVE-2022-45396.json index 926a8aa6a1b..d7405600b4c 100644 --- a/2022/45xxx/CVE-2022-45396.json +++ b/2022/45xxx/CVE-2022-45396.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45396", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45397.json b/2022/45xxx/CVE-2022-45397.json index d1814009133..c2cebf6487b 100644 --- a/2022/45xxx/CVE-2022-45397.json +++ b/2022/45xxx/CVE-2022-45397.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45397", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45398.json b/2022/45xxx/CVE-2022-45398.json index eb24b7577b8..adac3d0e6b1 100644 --- a/2022/45xxx/CVE-2022-45398.json +++ b/2022/45xxx/CVE-2022-45398.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45398", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45399.json b/2022/45xxx/CVE-2022-45399.json index d203b2fb664..7201c476fff 100644 --- a/2022/45xxx/CVE-2022-45399.json +++ b/2022/45xxx/CVE-2022-45399.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45399", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45400.json b/2022/45xxx/CVE-2022-45400.json index 3d63b3655b8..b4a77f6c2fb 100644 --- a/2022/45xxx/CVE-2022-45400.json +++ b/2022/45xxx/CVE-2022-45400.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45400", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/45xxx/CVE-2022-45401.json b/2022/45xxx/CVE-2022-45401.json index 3e631bd1b18..578fc05efad 100644 --- a/2022/45xxx/CVE-2022-45401.json +++ b/2022/45xxx/CVE-2022-45401.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2022-45401", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2022/4xxx/CVE-2022-4004.json b/2022/4xxx/CVE-2022-4004.json new file mode 100644 index 00000000000..321d9e2d3ae --- /dev/null +++ b/2022/4xxx/CVE-2022-4004.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-4004", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/4xxx/CVE-2022-4005.json b/2022/4xxx/CVE-2022-4005.json new file mode 100644 index 00000000000..748bb37f583 --- /dev/null +++ b/2022/4xxx/CVE-2022-4005.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-4005", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file